<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Conditional-Access — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/conditional-access/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 May 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/conditional-access/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unauthorized Modification of Azure Conditional Access Policy</title><link>https://feed.craftedsignal.io/briefs/2024-05-29-azure-ca-policy-update/</link><pubDate>Wed, 29 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-29-azure-ca-policy-update/</guid><description>An unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.</description><content:encoded><![CDATA[<p>Compromised or malicious actors may attempt to modify Azure Conditional Access (CA) policies to weaken security controls, elevate privileges, or establish persistence within the Azure environment. Conditional Access policies are critical for enforcing organizational security standards, and unauthorized changes can have significant security implications. This activity is detected through Azure Audit Logs by monitoring for &ldquo;Update conditional access policy&rdquo; events. Defenders should investigate any modifications to Conditional Access policies to ensure they are legitimate and align with security best practices. Detecting and responding to unauthorized CA policy modifications is crucial for maintaining the integrity and security of the Azure environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access through compromised credentials or other means (not specified in source).</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages existing privileges or exploits vulnerabilities to gain sufficient permissions to modify Conditional Access policies (e.g., through a compromised Global Administrator account).</li>
<li><strong>Policy Enumeration:</strong> The attacker enumerates existing Conditional Access policies to identify targets for modification using tools like Azure PowerShell or the Azure portal.</li>
<li><strong>Policy Modification:</strong> The attacker modifies a Conditional Access policy, for example, by weakening MFA requirements, excluding specific users or groups from the policy, or disabling the policy altogether.</li>
<li><strong>Persistence:</strong> By weakening or disabling Conditional Access policies, the attacker establishes a persistent foothold in the environment, allowing them to bypass security controls and maintain unauthorized access.</li>
<li><strong>Credential Access:</strong> With weakened MFA or other access controls, the attacker gains easier access to sensitive credentials.</li>
<li><strong>Defense Impairment:</strong> The modification of CA policies impairs the organization&rsquo;s defense mechanisms, making it easier for the attacker to perform malicious activities undetected.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of Conditional Access policies can lead to significant security breaches, including unauthorized access to sensitive data, privilege escalation, and persistent compromise of the Azure environment. The number of affected users and resources depends on the scope of the modified policies. Organizations may experience data loss, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;CA Policy Updated by Non Approved Actor&rdquo; Sigma rule to your SIEM to detect unauthorized modifications to Conditional Access policies within your Azure environment.</li>
<li>Review the <code>properties.message</code> field in the Azure Audit Logs for &ldquo;Update conditional access policy&rdquo; events and compare &ldquo;old&rdquo; vs &ldquo;new&rdquo; values to understand the nature of the changes.</li>
<li>Implement strict role-based access control (RBAC) to limit the number of users who can modify Conditional Access policies.</li>
<li>Investigate any alerts generated by the Sigma rule and verify whether the user identity, user agent, and/or hostname should be making changes in your environment.</li>
<li>Enable multi-factor authentication (MFA) for all users, especially those with administrative privileges, to reduce the risk of credential compromise (related to attack.credential-access tag).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>policy-modification</category><category>attack.privilege-escalation</category><category>attack.credential-access</category><category>attack.persistence</category><category>attack.defense-impairment</category><category>attack.t1548</category><category>attack.t1556</category></item><item><title>Unauthorized Removal of Azure Conditional Access Policy</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-azure-ca-policy-removal/</link><pubDate>Tue, 09 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-azure-ca-policy-removal/</guid><description>An unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.</description><content:encoded><![CDATA[<p>The unauthorized removal of a Conditional Access (CA) policy in Azure Active Directory can significantly weaken an organization&rsquo;s security posture. Conditional Access policies are critical for enforcing multi-factor authentication, device compliance, and other security controls based on user, location, device, and application conditions. When a non-approved actor removes such a policy, it can open the door for privilege escalation, credential access, and persistence by malicious actors. This activity is often performed after an initial compromise to disable security controls and move laterally within the environment. Identifying and responding to such removals promptly is essential to maintain a strong security posture.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to an account with sufficient privileges to view and modify Azure Active Directory settings. This could be through phishing, password spraying, or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker escalates privileges within Azure AD to gain the necessary permissions to manage Conditional Access policies. This might involve adding themselves to a privileged role or exploiting misconfigurations in existing roles.</li>
<li>Discovery: The attacker enumerates existing Conditional Access policies to identify targets for removal. They may focus on policies that enforce MFA or restrict access based on location.</li>
<li>Defense Evasion: The attacker disables or modifies logging configurations to reduce the likelihood of detection.</li>
<li>Policy Removal: The attacker removes the targeted Conditional Access policy using the Azure portal, PowerShell, or the Azure CLI. The audit logs will record a &ldquo;Delete conditional access policy&rdquo; event.</li>
<li>Credential Access: With the CA policy removed, the attacker may attempt to access sensitive resources or applications without MFA, potentially gaining access to credentials or sensitive data.</li>
<li>Persistence: The attacker establishes persistence by creating new user accounts or modifying existing ones to maintain access even if their initial entry point is discovered.</li>
<li>Lateral Movement: The attacker leverages the compromised credentials and weakened security controls to move laterally to other systems and resources within the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful removal of a Conditional Access policy can lead to widespread compromise. Attackers can bypass multi-factor authentication, gain unauthorized access to sensitive data, and escalate privileges within the organization. The impact can range from data breaches and financial losses to reputational damage and compliance violations. Depending on the scope of the compromised policy, the number of affected users could range from dozens to thousands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect the &ldquo;Delete conditional access policy&rdquo; event in Azure audit logs, indicating a CA policy removal.</li>
<li>Regularly review and audit Azure Active Directory role assignments to minimize the risk of unauthorized privilege escalation.</li>
<li>Implement multi-factor authentication for all user accounts, especially those with administrative privileges.</li>
<li>Monitor Azure audit logs for unusual activity, such as changes to user accounts, role assignments, and Conditional Access policies.</li>
<li>Investigate any detected instances of CA policy removal to determine the scope of the compromise and take appropriate remediation steps.</li>
<li>Review and harden Conditional Access policies to ensure they are effectively protecting critical resources and applications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>privilege-escalation</category><category>credential-access</category><category>persistence</category><category>defense-impairment</category></item><item><title>User Removed from Group with Conditional Access Policy Modification Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-group-removal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-group-removal/</guid><description>An attacker removes a user from a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, persistence, or defense evasion.</description><content:encoded><![CDATA[<p>This activity involves the removal of a user from an Azure Active Directory (Azure AD) group that possesses the ability to modify Conditional Access (CA) policies. Conditional Access policies are critical for enforcing organizational security standards and access controls. The removal of users from these groups can be an attempt by a malicious actor to disrupt security measures, escalate privileges, or establish persistence within the Azure environment. An attacker with sufficient privileges may remove legitimate administrators from CA policy modification groups to bypass multi-factor authentication or other controls, potentially gaining unauthorized access to sensitive resources. This activity is of concern to defenders as it can be a precursor to more significant compromises.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to an Azure AD account with sufficient privileges, possibly through credential theft or account compromise.</li>
<li>The attacker enumerates Azure AD groups to identify those with permissions to manage or modify Conditional Access policies.</li>
<li>The attacker identifies a target user account that is a member of the identified privileged group.</li>
<li>The attacker uses Azure AD administrative tools or PowerShell cmdlets to remove the target user from the privileged group.</li>
<li>The Azure Audit Logs record the event &ldquo;Remove member from group&rdquo; related to the targeted group and user.</li>
<li>The attacker modifies Conditional Access policies to weaken security controls, such as disabling multi-factor authentication or allowing access from untrusted locations.</li>
<li>The attacker leverages the weakened security posture to gain unauthorized access to sensitive resources or data.</li>
<li>The attacker establishes persistence by creating new, attacker-controlled accounts with high privileges or by modifying existing accounts to bypass security controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful removal of a user from a Conditional Access policy modification group can lead to significant security breaches. Attackers can weaken or disable MFA requirements, bypass location-based restrictions, and gain unauthorized access to sensitive applications and data. This can result in data exfiltration, financial loss, and reputational damage. The scope of the impact depends on the permissions assigned through the compromised Conditional Access policies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;User Removed From Group With CA Policy Modification Access&rdquo; to your SIEM to detect unauthorized removal of users from critical groups with CA modification access (logsource: azure, service: auditlogs).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the context of the user removed and the target group (Sigma rule).</li>
<li>Implement multi-factor authentication (MFA) for all administrative accounts, including those with permissions to manage Conditional Access policies.</li>
<li>Review and audit Azure AD group memberships regularly, especially for groups with elevated privileges.</li>
<li>Monitor Azure AD audit logs for suspicious activity related to group membership changes and Conditional Access policy modifications (logsource: azure, service: auditlogs).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>privilege-escalation</category></item><item><title>Unauthorized Conditional Access Policy Creation in Azure AD</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-ca-policy-add/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-ca-policy-add/</guid><description>An unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.</description><content:encoded><![CDATA[<p>This threat brief addresses the creation of a new Conditional Access (CA) policy within Azure Active Directory (Azure AD) by an actor not authorized to perform such actions. Conditional Access policies are critical security controls that enforce organizational policies based on various conditions, such as user identity, location, device, and application. Unauthorized modification or creation of these policies can lead to significant security breaches, allowing attackers to bypass security controls, escalate privileges, and gain unauthorized access to sensitive resources. This activity is detected via Azure Audit Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to an account with sufficient privileges to interact with Azure AD, potentially through compromised credentials or an insider threat.</li>
<li><strong>Privilege Escalation (If Needed):</strong> The attacker escalates privileges within Azure AD to a role that permits the creation or modification of Conditional Access policies.</li>
<li><strong>Policy Creation:</strong> The attacker creates a new Conditional Access policy using the Azure portal, PowerShell, or Azure CLI.</li>
<li><strong>Policy Configuration:</strong> The attacker configures the CA policy to weaken security controls, such as disabling MFA for specific users, locations, or applications.</li>
<li><strong>Bypass Security Controls:</strong> The newly created or modified CA policy allows the attacker to bypass intended security controls, granting them unauthorized access.</li>
<li><strong>Lateral Movement:</strong> With bypassed security controls, the attacker moves laterally within the network, accessing sensitive resources and data.</li>
<li><strong>Data Exfiltration/Impact:</strong> The attacker achieves their final objective, such as exfiltrating sensitive data or causing disruption to business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The creation of unauthorized Conditional Access policies can have severe consequences, including unauthorized access to sensitive data, privilege escalation, and circumvention of security controls. The impact can range from data breaches and financial loss to reputational damage and disruption of critical business services. If successful, attackers could gain complete control over the Azure AD environment, affecting all connected services and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized CA policy creation events in Azure Audit Logs.</li>
<li>Review Azure AD role assignments to ensure least privilege and restrict CA policy management to authorized personnel only.</li>
<li>Investigate any alerts generated by the Sigma rule to identify the actor and the details of the created CA policy.</li>
<li>Implement multi-factor authentication (MFA) for all users, especially those with administrative privileges, to reduce the risk of credential compromise.</li>
<li>Monitor Azure AD audit logs for other suspicious activities, such as changes to user accounts, group memberships, and application registrations.</li>
<li>Establish a baseline of expected CA policy configurations and alert on deviations from this baseline.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>conditional-access</category><category>privilege-escalation</category><category>attack.privilege-escalation</category><category>attack.t1548</category></item></channel></rss>